SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What sites support Integrated Windows Authentication?
On the properties of the DNS server in the DNS manager.
The local security logs.
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
Only sites added to the local Intranet Zones
2. How do you decrease zone transfer traffic?
It contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7 - Windows Vista - a Windows Update - or a new version of Windows Internet Explorer in your environment.
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
They are monitored but not enforced. Users can exced there quota limit.
Increase the SOA refresh interval parameter.
3. What is the command to add a DNS server?
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
Turn off the Log Spooler event on a print server.
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.
4. What is required to upgrade Vista to Windows 7?
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
The latest Vista Service Pack
A network location.
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
5. How do you calculate the original subnet mask of a network that was divided in to multiple networks?
It can add a driver to an offline WIM image with the /Add-Driver option
Drop both inbound and outbound traffic
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
They are monitored but not enforced. Users can exced there quota limit.
6. What are a few types of NAP enforcement points?
The latest Vista Service Pack
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
Uncheck IPV6 from the network properties.
3389
7. If you wanted to encrypt the connection between a client PC and the WSUS server what would you use?
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
SSL
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
8. What is Bcdboot?
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
Restrict the share permissions of the DFS root share.
Windows Aero was revised to be more touch-friendly.
9. What should you do if a host file is missing?
Use the "Connect to a Workplace" option
Restrict when a child can logon to a computer.
It can can forward requests from DHCP clients for ip addresses to a remote DHCP server.
You add it back to a DNS zone - clear the server DNS cache and clients DNS cache.
10. How do you block all traffic for a specific port in windows firewall?
Configure a GPO to modify the computers location to look for updates.
Configure a firewall rule to the specific port and block all connections.
A CONFIG.XML file
Configure the enforcement points as RADIUS clients.
11. What do Print permission only allows?
SSL
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
The latest Vista Service Pack
12. How does a autoconfiguration router or DHCP assign a IPV6 address (after the Local Link Address)?
They are AAAA records.
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
Migrates EFS encrypted files?
13. Why would you nest WSUS servers?
Distributed Cache mode. In this mode - local Windows 7 clients keep a copy of the content and make it available to other authorized clients that request the same data. This eliminates the need to have a server in the branch office. However - unlike H
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
Ping the Link Local Address (FE80 Address)
14. How do you quickly restore a file from backup?
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
On the zone file of the DNS server in the DNS manager.
15. What is Aero Peek?
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
Turn off the Log Spooler event on a print server.
Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the "Show desktop" button to the far right of the new taskbar.
16. What is an example of a rule based on file attributes derived from the digital signature?
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
Windows 7 Ultimate.
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo
Encapsulating Security payload protocol used for encryption the packets created by the AH.
17. How do you install applications in Windows XP Mode?
Encapsulating Security payload protocol used for encryption the packets created by the AH.
Enforce IPSEC on the network
You start by selecting Windows XP Mode from the Windows 7 Start Menu. You can install applications in Windows XP Mode just as you normally would on a physical PC. For example - you can install applications via web - from storage devices - or from phy
dynamic drives
18. Where is ageing configured?
Who can shutdown a computer
On the zone file of the DNS server in the DNS manager.
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
19. EFS encrypt files will not be __________.
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
DHCP server cannot assign an ip address
Sent across the network
Clear the content being cached
20. What is s stub zone?
The DHCP server will ping an ip address before assigning it.
To display friendly labels to capture packet address headers.
Does not
Contains a list of dynamically updated list of authorities for the zone.
21. Why would you use audit-only mode?
A .WFW file
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
To deploy the policy and understand its impact before enforcing it.
22. The WSUS server and remote SQL server _____________.
Does not
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
Export and import it from another computer.
Cannot be in different domains
23. What is BranchCache?
From the Network Policy Access Services role in system manager.
Place unhealthy computers in a quarantined network and auto-remediate clients.
It which enables content from file and Web servers on a wide area network (WAN) to be cached on computers at a local branch office. BranchCache can improve application response time and reduce WAN traffic. Cached content can either be distributed acr
By the RRAS manager or from the command line. For the subnet you can either use the / command or the octet subnet. Example: Route -p add 192.168.1.0/24 192.168.1.1
24. How can Transparent Caching is be enabled?
A .WFW file
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
Command line equilivant of Server Manager. You can install/remove roles and features on server 2008?
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
25. What does Parental Controls do?
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
Restrict when a child can logon to a computer.
EAP protocol.
26. What wireless protocolls can be used to authenticate smart cards?
Anew vpn protocol that uses SSL (port 443) for encryption.
Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the "Show desktop" button to the far right of the new taskbar.
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
WPA2 and 802.1x but require EAP-TLS to be enable.
27. How do you install RRAS?
WINRM QUICKCONFIG.
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
From the Network Policy Access Services role in system manager.
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
28. What does Microsoft Transform files (MST) do?
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
L2TP uses IPSEC to encrypt VPN traffic - PKI is needed to issue certificates that are required by IPSEC.
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
29. What is WPA-PSK?
Internet printing protocol. Used for connecting to printers via web browser.
It create a report of which files will be migrated
WPA-Personal (uses a preshared key)
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
30. How do you delegate permissions to modify a specific DNS zone?
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
Delegate permission by configuring the dacl of the zone file.
It backs up digitally identities to a password protected file.
31. How do client computers get configured to use a WSUS server?
Only a local administrator
Configure a GPO to modify the computers location to look for updates.
SP3
It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command - where target is the name (NetBIOS or FQDN) of the remote computer tha
32. What does Scanstate /OfflineWinOld: C:Windows.old do?
Perform an offline migration
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
Command line equilivant of Server Manager. You can install/remove roles and features on server 2008?
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
33. Where do you get the USMT?
Comes with the Windows Automated Installation Kit (WAIK)
1723
By using the dnscmd /zoneexport command.
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
34. What protocol does Ping uses?
In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access—without the need to VPN. When your IT department enab
The ICMP protocol.
Use it to can backup certificates to a .PFX file that is password protected.
Yes - it can be modified to apply to a network location.
35. What version does Windows XP must have to be able to connect with Remote Desktop to a computer requiring network level authentication?
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
Us edit dnscmd /zoneupdatefromdns command.
SP3
36. How do you setup multiple mx records?
Add an AD integrated zone
Restrict when a child can logon to a computer.
Sett up a priority for the preferred smtp server.
Se a capture filter based on the mac address of the problem PC.
37. How do you setup Ready Boost?
It create a report of which files will be migrated
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
Cannot be in different domains
Distributed Cache mode. In this mode - local Windows 7 clients keep a copy of the content and make it available to other authorized clients that request the same data. This eliminates the need to have a server in the branch office. However - unlike H
38. What does Scanstate /EFS:COPYRAW do?
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
Migrates EFS encrypted files?
Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server - which acts as a gateway to the intranet. The DirectAccess client establishes two IPsec tunnels: Psec Encapsulating Security Payload (ESP) tunnel and IPsec ESP tunnel.
By running the Update Status summary report.
39. How do you set a DNS server to a cache only DNS server?
Used to get a list of installed 3rd party drivers
Delete all the zone files or reinstall the DNS service.
On a core server
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
40. What drive is System protection is automatically setup on?
It contains new capabilities and extensions that you can: Define rules based on file attributes - Create exceptions to rules - Import and export rules - and use audit-only mode.
The first time a user opens a file in a shared folder - Windows 7 reads the file from the server and then stores it in a cache on the computer's hard disk drive. The second and subsequent times a user reads the same file - Windows 7 retrieves the cac
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
The Default Programs Control Panel applet
41. What port uses PPTP uses?
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
1723
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
Does not have
42. ________________ can be replicated through Ad replication.
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
Conditional forward
Clear the content being cached
One of the tunnels if DirectAccess by using both a computer certificate and user credentials. This tunnel authenticates the user and provides access to intranet resources and application servers.
43. What are the minimum hardware requirements for Windows 7?
Run Disk Cleanup and click Clean up system files. If you are prompted for an administrator password or confirmation - type the password or provide confirmation. Click the More Options tab - under System Restore and Shadow Copies - click Clean up. In
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
The DHCP server will ping an ip address before assigning it.
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor - 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) - 16 GB available hard disk space (32-bit) or 20 GB (64-bit) - DirectX 9 graphics device with WDDM 1.0 or higher driver
44. How does transparent caching work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. What do NAP clients do?
To display friendly labels to capture packet address headers.
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Does not
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
46. What should you do to provide redundancy in DNS dynamic updates?
Use AD integrated zones so the clients can update to more than one DNS server.
Anew vpn protocol that uses SSL (port 443) for encryption.
Ping the Link Local Address (FE80 Address)
A OOBE ready and will be booted into Windows Welcome
47. What is Touch UI?
Windows Aero was revised to be more touch-friendly.
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
They restrict disk space usage for users. If you modify the quota template it applies changes to all folders that the template is assigned.
48. What is DiskPart?
They are in the first 48 bits /48
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
Configure the enforcement points as RADIUS clients.
Divide up a large WIM file into multiple smaller .SWM files
49. What versions of Windows 7 support Bitlocker Drive Encryption?
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
50. What is a NPS server?
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
A network location.
A LAN Router only or a LAN to WAN Router
Only a local administrator